Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe
Resource
win10v2004-20241007-en
General
-
Target
6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe
-
Size
78KB
-
MD5
5035de61a0f808de5e03d37b266c6beb
-
SHA1
f265a2271892904229287ed7b62c974a2a20bb0e
-
SHA256
6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374
-
SHA512
c1803625cbce1da19375d43ba87b7e5afec2d008222725e16d28b0ace601c06b0d8abd6b09ff24c03fb9abe4d4e307eed9bcaae9a91bee2b356119cf78e41265
-
SSDEEP
1536:WPWtHY6JJteVdv5wyFppaVs+aYTCgtWzYXxxiMrBnP5oYZNQtC9/s1Eu:WPWtHYO3e/vqyA11XYUBxprBPjcC9/C
Malware Config
Signatures
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Executes dropped EXE 1 IoCs
pid Process 2676 tmpD75B.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System.Management = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sbscmp20_mscorlib.exe\"" tmpD75B.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpD75B.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe Token: SeDebugPrivilege 2676 tmpD75B.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2176 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 31 PID 2412 wrote to memory of 2176 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 31 PID 2412 wrote to memory of 2176 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 31 PID 2412 wrote to memory of 2176 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 31 PID 2176 wrote to memory of 2060 2176 vbc.exe 33 PID 2176 wrote to memory of 2060 2176 vbc.exe 33 PID 2176 wrote to memory of 2060 2176 vbc.exe 33 PID 2176 wrote to memory of 2060 2176 vbc.exe 33 PID 2412 wrote to memory of 2676 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 34 PID 2412 wrote to memory of 2676 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 34 PID 2412 wrote to memory of 2676 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 34 PID 2412 wrote to memory of 2676 2412 6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe"C:\Users\Admin\AppData\Local\Temp\6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\l8tpha_b.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD856.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD855.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpD75B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpD75B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6b9047ef8b63d813c70d08babf683b2fd56197dc0c544f1782bb51f53423c374.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53496f264b1fd7cf27b4f3f225e61137a
SHA1d4d7081a2098b3e22321d081350f7c711c451eff
SHA256371608972cb7537b8fb2ca7e7e446affbc3884fccb579c8b31fac0499b7c5732
SHA512b744562c18b8aceef12deeb0558f883fd7a8805c8fc15543ba534bf6ee20c9ca03a23b627701ce7100be296dab9330958bfbd0e44447d373f54b1ff2137b93d9
-
Filesize
15KB
MD5bbf712bb21da2c66b2bc938e39be8503
SHA10739758f7d253082d3dca73b8b28794bee2f0fcd
SHA25619d0533909dadde4e8d1089372c514b4e1dc5745e3ffc2ebe3ccb432c7e377d0
SHA5121948e5eb3186e73b0ce4c990336e569b9042f2aa588a1187593dc79ddf62284e6a1434bc4d4beed7f895926bd39d23874b3f4b314b3a0a95c3177124764a63b3
-
Filesize
266B
MD50c61d634a9c6c04d5e543479f423feb5
SHA160bb122a7eccaaf4ff47aaf1cbcac44e9f74dd3a
SHA256dc40303a43020702519a8fcfc07a7a902538820f59617bc9daf33256357f74d0
SHA5128363b4e713e72dedc21d3aecc2b8a38d2429d418e232e4ac22b22c99dcf0badab0ff0a149f3e8841ecdeed8e4b4e1c1966558a1d086162387fc69225eb99e444
-
Filesize
78KB
MD55b49a8d6d37b23137dff6e195b262a19
SHA1aa978d0dd7d283e5b8ee05157b469a4adc21053f
SHA25637a5267abb07be0371b1b4a7ff9d32358de27bf004034fec7495d3a158cd264b
SHA51231cab1c045afd1b087c97b30b5f08a42e9306b68b390201d70f07eb8340a3b0320254a5775463844a4dd8e0a80b0a90ed5fbe77f7879b2c23252905ba2f1f9e6
-
Filesize
660B
MD515c438ead8cda5da6787443ddfb58f43
SHA155a5efbeea5da8a820c8b5bb45a7581671a16bde
SHA256f97628d3697a9e79a792253ef62d0c595732a3aca81e94aaeef03ef23de3274b
SHA51234b805ba6c498170dfd7ce4fce4b5624059b442b79a1825993b3f6ef32f31ca5bdf8cfe5fa3e5ba2c3972507d779a235761414c791d0e419bc0ba3f99b754105
-
Filesize
62KB
MD58481b7e4924c14743ffc0d34075e2ce3
SHA1e8e7ef480499ba85190b8d5f8e43f761850b0ef3
SHA2566110931ed1cb1b1a141d4a12044a062646f14be3566a286106e5f59ceaddc4ac
SHA5123c4ee8221c5238aed57e4fdbcd74833edcf46d5ed602840b5265438538405b4378a1966e9cd0c34a5ce52d0afe7bd7e0d9aac6b420e515fe1ea52477f957a7e1